3 research outputs found

    Symmetric Encryption Algorithms: Review and Evaluation Study

    Get PDF
    The increased exchange of data over the Internet in the past two decades has brought data security and confidentiality to the fore front. Information security can be achieved by implementing encryption and decryption algorithms to ensure data remains secure and confidential, especially when transmitted over an insecure communication channel. Encryption is the method of coding information to prevent unauthorized access and ensure data integrity and confidentiality, whereas the reverse process is known as decryption. All encryption algorithms aim to secure data, however, their performance varies according to several factors such as file size, type, complexity, and platform used. Furthermore, while some encryption algorithms outperform others, they have been proven to be vulnerable against certain attacks. In this paper, we present a general overview of common encryption algorithms   and explain their inner workings. Additionally, we select ten different symmetric encryption algorithms and conduct a simulation in Java to test their performance. The algorithms we compare are: AES, BLOWFISH, RC2, RC4, RC6, DES, DESede, SEED, XTEA, and IDEA. We present the results of our simulation in terms of encryption speed, throughput, and CPU utilization rate for various file sizes ranging from 1MB to 1GB. We further analyze our results for all measures that have been tested, taking into account the level of security they provide

    Evolution of Malware Threats and Techniques: a Review

    Get PDF
    The rapid development of technology, and its usage, in our everyday lives caused us to depend on many of the aspects it offers. The evolution of the Internet in recent decades has changed human life drastically as accessing knowledge, communication, and social interaction, became readily available. Nowadays, we have become dependent on our PCs and smart devices in accomplishing everyday tasks. People are using these devices to store valuable information. This information became the target of cybercriminals who are constantly creating new ways to gain unauthorized access to it. In the past few decades, cybercrime and the construction of malicious software (malware), have seen a significant rise. In this research, we present a literature review of the historical evolution of malware. We describe the common characteristics and propagation methods for the types of malware in each phase of its evolution. Furthermore, we illustrate the purpose of its creation and the damages it has caused. The purpose of this study is to provide researchers with background about malware and its evolution leading up to present day threats

    Traumatic spinal injuries in Saudi Arabia: a retrospective single-centre medical record review

    No full text
    Objectives To describe the patterns and outcomes of traumatic spinal injuries (TSIs) in a tertiary care trauma centre in Riyadh, Saudi Arabia.Design Retrospective medical record review.Setting Level 1 trauma centre for all patients presented from 1 February 2016 to 31 December 2018.Participants and data Records of patients presenting with any spinal trauma were reviewed, and the data obtained included age, gender, nationality (as Saudi and non-Saudi), date of presentation, site of fracture/injury, associated injuries, mechanism of injury, presence of neurological involvement and hospital mortality.Main outcomes Frequencies of different types of TSI across various subgroups.Results We identified 692 patients who presented with TSI throughout the study period. The mean age was 36.9 years. Males represented 83.2% (n=576) of the sample size, and the most common mechanism of injury was motor vehicle collision (MVC), accounting for 66.8% of cases (n=462), while fall-related injuries were seen in 31.6% of cases (n=219). A total of 454 (65.6%) of all patients were Saudi, and 332 (73.1%) of the TSIs in Saudis were due to MVC. Non-Saudi cases accounted for 238 (34.4%) of all patients, and 89 (37.4%) of the non-Saudi injuries were due to falls from height, and this association was statistically significant (p<0.001).Conclusion TSI was not thoroughly examined in Saudi Arabia; therefore, this study is considered the first to be done in the Kingdom using a representative sample. The fact that non-Saudi patients had a higher proportion of falls as a mechanism of injury should be taken into consideration in terms of raising awareness and taking more safety precautions, as most construction workers tend to be expatriates
    corecore